Featured Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances Ground your defense against React2Shell in verifiable network evidence. Deploy high-fidelity Suricata detections to spot unauthenticated remote code... David Burkett Dec 19, 2025
Zeek How Zeek can provide insights despite encrypted communications This post will outline some methods Zeek employs to provide visibility into SSH connections. Anthony Kasza May 7, 2019